Cyber Health Score

External posture for security and risk teams.

Trust

Security posture

Cyber Health Score is architected around tenant isolation, audited access, and least-privilege operations. This page summarises principles — not an auditor-ready attestation.

Tenant isolation

Tenant data is scoped server-side using organisation membership. Tenant administrators control who can invite users, configure scheduled scanning, and grant time-limited internal support access.

Credentials and sessions

Authentication uses secure cookies and secrets configured in your deployment environment. Operators should follow organisational password and device policies when using the tenant workspace.

Responsible scanning

Posture scans run only against verified assets your organisation owns. Passive discovery avoids aggressive probing by design; advanced checks remain policy-gated.

Questions? Contact us or read the Trust centre.